Generating IoT Specific Anomaly Datasets Using Cooja Simulator (Contiki-OS) and Performance Evaluation of Deep Learning Model Coupled with Aquila Optimizer

Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
{"title":"Generating IoT Specific Anomaly Datasets Using Cooja Simulator (Contiki-OS) and Performance Evaluation of Deep Learning Model Coupled with Aquila Optimizer","authors":"Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury","doi":"10.3844/jcssp.2020.365.378","DOIUrl":null,"url":null,"abstract":": In recent times, the massive expansion of the Internet of Things (IoT) has transformed various facets of everyday life and industries. The compelling cause behind the widespread adoption of IoT is the increasing availability of affordable, compact, and energy-efficient computing devices. While these devices offer significant benefits, they also raise substantial security and privacy challenges. Consequently, safeguarding IoT networks and devices is imperative. To raise a robust security system for IoT networks, it is crucial to have an efficient anomaly-based intrusion detection system. In this study, we introduce a meticulous methodology to create IoT-specific datasets. Utilizing the Contiki-OS Cooja simulator, we generate datasets representative of real-world IoT security threats, including sinkholes, version numbers, and flooding attacks. We then evaluate the performance of a Convolutional Neural Network paired with an Aquila Optimizer (CNN-AO) using these self-generated datasets, by employing metrics such as accuracy, precision, recall, F1-score, sensitivity, specificity, and false alarm rate. Additionally, we compare the effectiveness of CNN and LSTM models in distinguishing between benign and malicious traffic. Our findings demonstrate that the CNN-AO model surpasses other models in accurately classifying normal and malicious traffic with an accuracy of 99.22, 99.77, and 99.55% for our self-generated malicious datasets based on sinkhole attack, version number attack, and flooding attack respectively. This novel approach not only establishes a solid foundation for future investigations in this domain but also provides valuable insights into enhancing IoT system security. In this study, we contribute to the field by introducing a robust methodology for IoT-specific dataset generation and evaluating a cutting-edge CNN-AO model for intrusion detection. Furthermore, it is crucial to note that this research was conducted with utmost ethical consideration. Ethical guidelines and data privacy concerns were meticulously addressed during the generation of IoT datasets and the simulation of real-world attack scenarios, ensuring the responsible conduct of our study.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3844/jcssp.2020.365.378","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

: In recent times, the massive expansion of the Internet of Things (IoT) has transformed various facets of everyday life and industries. The compelling cause behind the widespread adoption of IoT is the increasing availability of affordable, compact, and energy-efficient computing devices. While these devices offer significant benefits, they also raise substantial security and privacy challenges. Consequently, safeguarding IoT networks and devices is imperative. To raise a robust security system for IoT networks, it is crucial to have an efficient anomaly-based intrusion detection system. In this study, we introduce a meticulous methodology to create IoT-specific datasets. Utilizing the Contiki-OS Cooja simulator, we generate datasets representative of real-world IoT security threats, including sinkholes, version numbers, and flooding attacks. We then evaluate the performance of a Convolutional Neural Network paired with an Aquila Optimizer (CNN-AO) using these self-generated datasets, by employing metrics such as accuracy, precision, recall, F1-score, sensitivity, specificity, and false alarm rate. Additionally, we compare the effectiveness of CNN and LSTM models in distinguishing between benign and malicious traffic. Our findings demonstrate that the CNN-AO model surpasses other models in accurately classifying normal and malicious traffic with an accuracy of 99.22, 99.77, and 99.55% for our self-generated malicious datasets based on sinkhole attack, version number attack, and flooding attack respectively. This novel approach not only establishes a solid foundation for future investigations in this domain but also provides valuable insights into enhancing IoT system security. In this study, we contribute to the field by introducing a robust methodology for IoT-specific dataset generation and evaluating a cutting-edge CNN-AO model for intrusion detection. Furthermore, it is crucial to note that this research was conducted with utmost ethical consideration. Ethical guidelines and data privacy concerns were meticulously addressed during the generation of IoT datasets and the simulation of real-world attack scenarios, ensuring the responsible conduct of our study.
使用 Cooja 模拟器(Contiki-OS)生成物联网特定异常数据集,并对与 Aquila 优化器结合的深度学习模型进行性能评估
:近来,物联网(IoT)的大规模扩展已经改变了日常生活和各行各业的方方面面。物联网得到广泛应用的根本原因是价格低廉、结构紧凑、高能效的计算设备越来越多。这些设备在带来巨大好处的同时,也带来了巨大的安全和隐私挑战。因此,保护物联网网络和设备的安全势在必行。要为物联网网络建立一个强大的安全系统,关键是要有一个高效的基于异常的入侵检测系统。在本研究中,我们介绍了一种创建物联网专用数据集的细致方法。利用 Contiki-OS Cooja 模拟器,我们生成了能代表现实世界物联网安全威胁的数据集,包括漏洞、版本号和洪水攻击。然后,我们利用这些自生成的数据集,采用准确度、精确度、召回率、F1 分数、灵敏度、特异性和误报率等指标,评估了卷积神经网络与 Aquila 优化器(CNN-AO)的性能。此外,我们还比较了 CNN 和 LSTM 模型在区分良性和恶意流量方面的有效性。我们的研究结果表明,CNN-AO 模型在对正常流量和恶意流量进行准确分类方面超越了其他模型,对于我们基于天坑攻击、版本号攻击和洪水攻击自生成的恶意数据集,其准确率分别为 99.22%、99.77% 和 99.55%。这种新颖的方法不仅为该领域未来的研究奠定了坚实的基础,还为增强物联网系统的安全性提供了宝贵的见解。在本研究中,我们为物联网特定数据集的生成引入了一种稳健的方法,并评估了用于入侵检测的尖端 CNN-AO 模型,从而为该领域做出了贡献。此外,必须指出的是,本研究是在考虑到最高道德标准的情况下进行的。在生成物联网数据集和模拟真实世界攻击场景的过程中,道德准则和数据隐私问题都得到了细致的处理,确保了我们的研究以负责任的方式进行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Computer Science
Journal of Computer Science Computer Science-Computer Networks and Communications
CiteScore
1.70
自引率
0.00%
发文量
92
期刊介绍: Journal of Computer Science is aimed to publish research articles on theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. JCS updated twelve times a year and is a peer reviewed journal covers the latest and most compelling research of the time.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信